-
Exemplar LCA-Decoder: A Scalable Framework for On-Chip Learning
Authors:
Sanaz Mahmoodi Takaghaj,
Jack Sampson
Abstract:
Neuromorphic computing has recently gained significant attention as a promising combined approach for develo** energy-efficient, parallel computing systems inspired by the human brain. Efficient training algorithms are imperative for the effective processing of data on neuromorphic platforms; however, their absence remains a notable gap in the field. In this paper, we reduce the gap by proposing…
▽ More
Neuromorphic computing has recently gained significant attention as a promising combined approach for develo** energy-efficient, parallel computing systems inspired by the human brain. Efficient training algorithms are imperative for the effective processing of data on neuromorphic platforms; however, their absence remains a notable gap in the field. In this paper, we reduce the gap by proposing an innovative encoder-decoder technique that leverages sparse coding and the Locally Competitive Algorithm (LCA) to provide a computationally efficient and power-conscious algorithm specifically designed for neuromorphic platforms. Using Exemplar LCA-Decoder we reduce the computational demands and memory requirements associated with training Spiking Neural Networks (SNNs) using error backpropagation methods. Our results show notable test accuracy on ImageNet and CIFAR10/100 datasets, surpassing the previously achieved SNN accuracy on these datasets. Additionally, Exemplar LCA-Decoder is scalable and allows expanding the model and adding new data points and classes cost-effectively.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
Can Prompt Modifiers Control Bias? A Comparative Analysis of Text-to-Image Generative Models
Authors:
Philip Wootaek Shin,
Jihyun Janice Ahn,
Wenpeng Yin,
Jack Sampson,
Vijaykrishnan Narayanan
Abstract:
It has been shown that many generative models inherit and amplify societal biases. To date, there is no uniform/systematic agreed standard to control/adjust for these biases. This study examines the presence and manipulation of societal biases in leading text-to-image models: Stable Diffusion, DALL-E 3, and Adobe Firefly. Through a comprehensive analysis combining base prompts with modifiers and t…
▽ More
It has been shown that many generative models inherit and amplify societal biases. To date, there is no uniform/systematic agreed standard to control/adjust for these biases. This study examines the presence and manipulation of societal biases in leading text-to-image models: Stable Diffusion, DALL-E 3, and Adobe Firefly. Through a comprehensive analysis combining base prompts with modifiers and their sequencing, we uncover the nuanced ways these AI technologies encode biases across gender, race, geography, and region/culture. Our findings reveal the challenges and potential of prompt engineering in controlling biases, highlighting the critical need for ethical AI development promoting diversity and inclusivity.
This work advances AI ethics by not only revealing the nuanced dynamics of bias in text-to-image generation models but also by offering a novel framework for future research in controlling bias. Our contributions-panning comparative analyses, the strategic use of prompt modifiers, the exploration of prompt sequencing effects, and the introduction of a bias sensitivity taxonomy-lay the groundwork for the development of common metrics and standard analyses for evaluating whether and how future AI models exhibit and respond to requests to adjust for inherent biases.
△ Less
Submitted 8 June, 2024;
originally announced June 2024.
-
Top of the Heap: Efficient Memory Error Protection for Many Heap Objects
Authors:
Kaiming Huang,
Mathias Payer,
Zhiyun Qian,
Jack Sampson,
Gang Tan,
Trent Jaeger
Abstract:
Exploits against heap memory errors continue to be a major concern. Although many defenses have been proposed, heap data are not protected from attacks that exploit memory errors systematically. Research defenses focus on complete coverage of heap objects, often giving up on comprehensive memory safety protection and/or incurring high costs in performance overhead and memory usage. In this paper,…
▽ More
Exploits against heap memory errors continue to be a major concern. Although many defenses have been proposed, heap data are not protected from attacks that exploit memory errors systematically. Research defenses focus on complete coverage of heap objects, often giving up on comprehensive memory safety protection and/or incurring high costs in performance overhead and memory usage. In this paper, we propose a solution for heap memory safety enforcement that aims to provide comprehensive protection from memory errors efficiently by protecting those heap objects whose accesses are provably safe from memory errors. Specifically, we present the Uriah system that statically validates spatial and type memory safety for heap objects, isolating compliant objects on a safe heap that enforces temporal type safety to prevent attacks on memory reuse. Using Uriah, 71.9% of heap allocation sites can be shown to produce objects (73% of allocations are found safe) that satisfy spatial and type safety, which are then isolated using Uriah's heap allocator from memory accesses via unsafe heap objects. Uriah only incurs 2.9% overhead and only uses 9.3% more memory on SPEC CPU2006 (C/C++) benchmarks, showing that many heap objects can be protected from all classes of memory errors efficiently.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Increasing efficiency and reducing bias when assessing HPV vaccination efficacy by using non-targeted HPV strains
Authors:
Lola Etievant,
Joshua N. Sampson,
Mitchell H. Gail
Abstract:
Studies of vaccine efficacy often record both the incidence of vaccine-targeted virus strains (primary outcome) and the incidence of non-targeted strains (secondary outcome). However, standard estimates of vaccine efficacy on targeted strains ignore the data on non-targeted strains. Assuming non-targeted strains are unaffected by vaccination, we regard the secondary outcome as a negative control o…
▽ More
Studies of vaccine efficacy often record both the incidence of vaccine-targeted virus strains (primary outcome) and the incidence of non-targeted strains (secondary outcome). However, standard estimates of vaccine efficacy on targeted strains ignore the data on non-targeted strains. Assuming non-targeted strains are unaffected by vaccination, we regard the secondary outcome as a negative control outcome and show how using such data can (i) increase the precision of the estimated vaccine efficacy against targeted strains in randomized trials, and (ii) reduce confounding bias of that same estimate in observational studies. For objective (i), we augment the primary outcome estimating equation with a function of the secondary outcome that is unbiased for zero. For objective (ii), we jointly estimate the treatment effects on the primary and secondary outcomes. If the bias induced by the unmeasured confounders is similar for both types of outcomes, as is plausible for factors that influence the general risk of infection, then we can use the estimated efficacy against the secondary outcomes to remove the bias from estimated efficacy against the primary outcome. We demonstrate the utility of these approaches in studies of HPV vaccines that only target a few highly carcinogenic strains. In this example, using non-targeted strains increased precision in randomized trials modestly but reduced bias in observational studies substantially.
△ Less
Submitted 29 December, 2022;
originally announced December 2022.
-
Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities
Authors:
Aditya Basu,
John Sampson,
Zhiyun Qian,
Trent Jaeger
Abstract:
File name confusion attacks, such as malicious symbolic links and file squatting, have long been studied as sources of security vulnerabilities. However, a recently emerged type, i.e., case-sensitivity-induced name collisions, has not been scrutinized. These collisions are introduced by differences in name resolution under case-sensitive and case-insensitive file systems or directories. A prominen…
▽ More
File name confusion attacks, such as malicious symbolic links and file squatting, have long been studied as sources of security vulnerabilities. However, a recently emerged type, i.e., case-sensitivity-induced name collisions, has not been scrutinized. These collisions are introduced by differences in name resolution under case-sensitive and case-insensitive file systems or directories. A prominent example is the recent Git vulnerability (CVE-2021-21300) which can lead to code execution on a victim client when it clones a maliciously crafted repository onto a case-insensitive file system. With trends including ext4 adding support for per-directory case-insensitivity and the broad deployment of the Windows Subsystem for Linux, the prerequisites for such vulnerabilities are increasingly likely to exist even in a single system.
In this paper, we make a first effort to investigate how and where the lack of any uniform approach to handling name collisions leads to a diffusion of responsibility and resultant vulnerabilities. Interestingly, we demonstrate the existence of a range of novel security challenges arising from name collisions and their inconsistent handling by low-level utilities and applications. Specifically, our experiments show that utilities handle many name collision scenarios unsafely, leaving the responsibility to applications whose developers are unfortunately not yet aware of the threats. We examine three case studies as a first step towards systematically understanding the emerging type of name collision vulnerability.
△ Less
Submitted 29 November, 2022;
originally announced November 2022.
-
Seeker: Synergizing Mobile and Energy Harvesting Wearable Sensors for Human Activity Recognition
Authors:
Cyan Subhra Mishra,
Jack Sampson,
Mahmut Taylan Kandemir,
Vijaykrishnan Narayanan
Abstract:
There is an increasing demand for intelligent processing on emerging ultra-low-power internet of things (IoT) devices, and recent works have shown substantial efficiency boosts by executing inference tasks directly on the IoT device (node) rather than merely transmitting sensor data. However, the computation and power demands of Deep Neural Network (DNN)-based inference pose significant challenges…
▽ More
There is an increasing demand for intelligent processing on emerging ultra-low-power internet of things (IoT) devices, and recent works have shown substantial efficiency boosts by executing inference tasks directly on the IoT device (node) rather than merely transmitting sensor data. However, the computation and power demands of Deep Neural Network (DNN)-based inference pose significant challenges for nodes in an energy-harvesting wireless sensor network (EH-WSN). Moreover, these tasks often require responses from multiple physically distributed EH sensor nodes, which imposes crucial system optimization challenges in addition to per-node constraints.
To address these challenges, we propose \emph{Seeker}, a novel approach to efficiently execute DNN inferences for Human Activity Recognition (HAR) tasks, using both an EH-WSN and a host mobile device. Seeker minimizes communication overheads and maximizes computation at each sensor without violating the quality of service. \emph{Seeker} uses a \emph{store-and-execute} approach to complete a subset of inferences on the EH sensor node, reducing communication with the mobile host. Further, for those inferences unfinished because of harvested energy constraints, it leverages an \emph{activity aware coreset} (AAC) construction to efficiently communicate compact features to the host device where ensemble techniques are used to efficiently finish the inferences. \emph{Seeker} performs HAR with $86.8\%$ accuracy, surpassing the $81.2\%$ accuracy of a state of the art approach. Moreover, by using AAC, it lowers the communication data volume by $8.9\times$.
△ Less
Submitted 25 March, 2022;
originally announced April 2022.
-
The Polychromatic Number of Small Subsets of the Integers Modulo $n$
Authors:
Emelie Curl,
John Goldwasser,
Joe Sampson,
Michael Young
Abstract:
If $S$ is a subset of an abelian group $G$, the polychromatic number of $S$ in $G$ is the largest integer $k$ so that there is a $k-$coloring of the elements of $G$ such that every translate of $S$ in $G$ gets all $k$ colors. We determine the polychromatic number of all sets of size 2 or 3 in the group of integers mod n.
If $S$ is a subset of an abelian group $G$, the polychromatic number of $S$ in $G$ is the largest integer $k$ so that there is a $k-$coloring of the elements of $G$ such that every translate of $S$ in $G$ gets all $k$ colors. We determine the polychromatic number of all sets of size 2 or 3 in the group of integers mod n.
△ Less
Submitted 28 July, 2020;
originally announced July 2020.
-
Dynamical System Modeling to Simulate Donor T Cell Response to Whole Exome Sequencing-Derived Recipient Peptides: Understanding Randomness in Clinical Outcomes Following Stem Cell Transplantation
Authors:
V Koparde,
B Abdul Razzaq,
T Suntum,
R Sabo,
A Scalora,
M Serrano,
M Jameson-Lee,
C Hall,
D Kobulnicky,
N Sheth,
J Sampson,
C Roberts,
G Buck,
M Neale,
A Toor
Abstract:
Alloreactivity following stem cell transplantation (SCT) is difficult to predict in patients undergoing transplantation from HLA matched donors. In this study we performed whole exome sequencing of SCT donor-recipient pairs (DRP). This allowed determination of entire library of alloreactive peptide sequences which would bind HLA class I molecules in each DRP. Utilizing the HLA binding affinity (IC…
▽ More
Alloreactivity following stem cell transplantation (SCT) is difficult to predict in patients undergoing transplantation from HLA matched donors. In this study we performed whole exome sequencing of SCT donor-recipient pairs (DRP). This allowed determination of entire library of alloreactive peptide sequences which would bind HLA class I molecules in each DRP. Utilizing the HLA binding affinity (IC50) and tissue expression levels of the parent proteins, an aggregate donor T cell response to the recipient alloreactive peptides was calculated using a vector-operator dynamical system model. Marked variability in the simulated CD8+ T cell responses was observed in all the donor recipient pairs.
△ Less
Submitted 27 November, 2016;
originally announced November 2016.
-
Leveraging local identity-by-descent increases the power of case/control GWAS with related individuals
Authors:
Joshua N. Sampson,
Bill Wheeler,
Peng Li,
Jianxin Shi
Abstract:
Large case/control Genome-Wide Association Studies (GWAS) often include groups of related individuals with known relationships. When testing for associations at a given locus, current methods incorporate only the familial relationships between individuals. Here, we introduce the chromosome-based Quasi Likelihood Score (cQLS) statistic that incorporates local Identity-By-Descent (IBD) to increase t…
▽ More
Large case/control Genome-Wide Association Studies (GWAS) often include groups of related individuals with known relationships. When testing for associations at a given locus, current methods incorporate only the familial relationships between individuals. Here, we introduce the chromosome-based Quasi Likelihood Score (cQLS) statistic that incorporates local Identity-By-Descent (IBD) to increase the power to detect associations. In studies robust to population stratification, such as those with case/control sibling pairs, simulations show that the study power can be increased by over 50%. In our example, a GWAS examining late-onset Alzheimer's disease, the $p$-values among the most strongly associated SNPs in the APOE gene tend to decrease, with the smallest $p$-value decreasing from $1.23\times10^{-8}$ to $7.70\times 10^{-9}$. Furthermore, as a part of our simulations, we reevaluate our expectations about the use of families in GWAS. We show that, although adding only half as many unique chromosomes, genoty** affected siblings is more efficient than genoty** randomly ascertained cases. We also show that genoty** cases with a family history of disease will be less beneficial when searching for SNPs with smaller effect sizes.
△ Less
Submitted 31 July, 2014;
originally announced July 2014.
-
In Silico Derivation of HLA-Specific Alloreactivity Potential from Whole Exome Sequencing of Stem Cell Transplant Donors and Recipients: Understanding the Quantitative Immuno-biology of Allogeneic Transplantation
Authors:
Max Jameson-Lee,
Vishal Koparde,
Phil Griffith,
Allison F. Scalora,
Juliana K. Sampson,
Haniya Khalid,
Nihar U. Sheth,
Michael Batalo,
Myrna G. Serrano,
Catherine H. Roberts,
Michael L. Hess,
Gregory A. Buck,
Michael C. Neale,
Masoud H. Manjili,
Amir A. Toor
Abstract:
Donor T cell mediated graft vs. host effects may result from the aggregate alloreactivity to minor histocompatibility antigens (mHA) presented by the HLA in each donor-recipient pair (DRP) undergoing stem cell transplantation (SCT). Whole exome sequencing has demonstrated extensive nucleotide sequence variation in HLA-matched DRP. Non-synonymous single nucleotide polymorphisms (nsSNPs) in the GVH…
▽ More
Donor T cell mediated graft vs. host effects may result from the aggregate alloreactivity to minor histocompatibility antigens (mHA) presented by the HLA in each donor-recipient pair (DRP) undergoing stem cell transplantation (SCT). Whole exome sequencing has demonstrated extensive nucleotide sequence variation in HLA-matched DRP. Non-synonymous single nucleotide polymorphisms (nsSNPs) in the GVH direction (polymorphisms present in recipient and absent in donor) were identified in 4 HLA-matched related and 5 unrelated DRP. The nucleotide sequence flanking each SNP was obtained utilizing the ANNOVAR software package. All possible nonameric-peptides encoded by the non-synonymous SNP were then interrogated in-silico for their likelihood to be presented by the HLA class I molecules in individual DRP, using the Immune-Epitope Database (IEDB) SMM algorithm. The IEDB-SMM algorithm predicted a median 18,396 peptides/DRP which bound HLA with an IC50 of <500nM, and 2254 peptides/DRP with an IC50 of <50nM. Unrelated donors generally had higher numbers of peptides presented by the HLA. A similarly large library of presented peptides was identified when the data was interrogated using the Net MHCPan algorithm. These peptides were uniformly distributed in the various organ systems. The bioinformatic algorithm presented here demonstrates that there may be a high level of minor histocompatibility antigen variation in HLA-matched individuals, constituting an HLA-specific alloreactivity potential. These data provide a possible explanation for how relatively minor adjustments in GVHD prophylaxis yield relatively similar outcomes in HLA matched and mismatched SCT recipients.
△ Less
Submitted 14 June, 2014;
originally announced June 2014.
-
Whole Exome Sequencing to Estimate Alloreactivity Potential Between Donors and Recipients in Stem Cell Transplantation
Authors:
Juliana K. Sampson,
Nihar U. Sheth,
Vishal N. Koparde,
Allison F. Scalora,
Myrna G. Serrano,
Vladimir Lee,
Catherine H. Roberts,
Maximilian Jameson-Lee,
Andrea Ferriera-Gonzalez,
Masoud H. Manjili,
Gregory A. Buck,
Michael C. Neale,
Amir A. Toor
Abstract:
Whole exome sequencing was performed on HLA-matched stem cell donors and transplant recipients to measure sequence variation contributing to minor histocompatibility antigen differences between the two. A large number of nonsynonymous single nucleotide polymorphisms were identified in each of the nine unique donor-recipient pairs tested. This variation was greater in magnitude in unrelated donors…
▽ More
Whole exome sequencing was performed on HLA-matched stem cell donors and transplant recipients to measure sequence variation contributing to minor histocompatibility antigen differences between the two. A large number of nonsynonymous single nucleotide polymorphisms were identified in each of the nine unique donor-recipient pairs tested. This variation was greater in magnitude in unrelated donors as compared with matched related donors. Knowledge of the magnitude of exome variation between stem cell transplant recipients and donors may allow more accurate titration of immunosuppressive therapy following stem cell transplantation.
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
Nuclear astrophysics with radioactive ions at FAIR
Authors:
R. Reifarth,
S. Altstadt,
K. Göbel,
T. Heftrich,
M. Heil,
A. Koloczek,
C. Langer,
R. Plag,
M. Pohl,
K. Sonnabend,
M. Weigand,
T. Adachi,
F. Aksouh,
J. Al-Khalili,
M. AlGarawi,
S. AlGhamdi,
G. Alkhazov,
N. Alkhomashi,
H. Alvarez-Pol,
R. Alvarez-Rodriguez,
V. Andreev,
B. Andrei,
L. Atar,
T. Aumann,
V. Avdeichikov
, et al. (295 additional authors not shown)
Abstract:
The nucleosynthesis of elements beyond iron is dominated by neutron captures in the s and r processes. However, 32 stable, proton-rich isotopes cannot be formed during those processes, because they are shielded from the s-process flow and r-process beta-decay chains. These nuclei are attributed to the p and rp process.
For all those processes, current research in nuclear astrophysics addresses t…
▽ More
The nucleosynthesis of elements beyond iron is dominated by neutron captures in the s and r processes. However, 32 stable, proton-rich isotopes cannot be formed during those processes, because they are shielded from the s-process flow and r-process beta-decay chains. These nuclei are attributed to the p and rp process.
For all those processes, current research in nuclear astrophysics addresses the need for more precise reaction data involving radioactive isotopes. Depending on the particular reaction, direct or inverse kinematics, forward or time-reversed direction are investigated to determine or at least to constrain the desired reaction cross sections.
The Facility for Antiproton and Ion Research (FAIR) will offer unique, unprecedented opportunities to investigate many of the important reactions. The high yield of radioactive isotopes, even far away from the valley of stability, allows the investigation of isotopes involved in processes as exotic as the r or rp processes.
△ Less
Submitted 6 October, 2013;
originally announced October 2013.
-
AGATA - Advanced Gamma Tracking Array
Authors:
S. Akkoyun,
A. Algora,
B. Alikhani,
F. Ameil,
G. de Angelis,
L. Arnold,
A. Astier,
A. Ataç,
Y. Aubert,
C. Aufranc,
A. Austin,
S. Aydin,
F. Azaiez,
S. Badoer,
D. L. Balabanski,
D. Barrientos,
G. Baulieu,
R. Baumann,
D. Bazzacco,
F. A. Beck,
T. Beck,
P. Bednarczyk,
M. Bellato,
M. A. Bentley,
G. Benzoni
, et al. (329 additional authors not shown)
Abstract:
The Advanced GAmma Tracking Array (AGATA) is a European project to develop and operate the next generation gamma-ray spectrometer. AGATA is based on the technique of gamma-ray energy tracking in electrically segmented high-purity germanium crystals. This technique requires the accurate determination of the energy, time and position of every interaction as a gamma ray deposits its energy within the…
▽ More
The Advanced GAmma Tracking Array (AGATA) is a European project to develop and operate the next generation gamma-ray spectrometer. AGATA is based on the technique of gamma-ray energy tracking in electrically segmented high-purity germanium crystals. This technique requires the accurate determination of the energy, time and position of every interaction as a gamma ray deposits its energy within the detector volume. Reconstruction of the full interaction path results in a detector with very high efficiency and excellent spectral response. The realization of gamma-ray tracking and AGATA is a result of many technical advances. These include the development of encapsulated highly-segmented germanium detectors assembled in a triple cluster detector cryostat, an electronics system with fast digital sampling and a data acquisition system to process the data at a high rate. The full characterization of the crystals was measured and compared with detector-response simulations. This enabled pulse-shape analysis algorithms, to extract energy, time and position, to be employed. In addition, tracking algorithms for event reconstruction were developed. The first phase of AGATA is now complete and operational in its first physics campaign. In the future AGATA will be moved between laboratories in Europe and operated in a series of campaigns to take advantage of the different beams and facilities available to maximize its science output. The paper reviews all the achievements made in the AGATA project including all the necessary infrastructure to operate and support the spectrometer.
△ Less
Submitted 17 September, 2012; v1 submitted 24 November, 2011;
originally announced November 2011.